AWS Partner Network (APN) Blog

Category: Security

WhiteSource_AWS Solutions

How to Bake Open Source Security into Your AWS CodeBuild Pipeline

Managing open source vulnerabilities can be challenging, especially at scale in a fast-moving continuous integration pipeline. Developers and DevOps professionals depend on CI pipeline tools like AWS CodeBuild to help them develop and test software at a breakneck pace, pushing out new software with greater efficiency and flexibility. In this post, learn how to integrate WhiteSource into CodeBuild pipeline to fuse open source security into existing build processes without having to compromise on speed or agility.

Read More
HashiCorp_AWS Solutions

How to Secure Enterprise Cloud Environments with AWS and HashiCorp

Security isn’t always top of mind for developers because it can slow down software releases. HashiCorp Vault helps eliminate much of the security burden developers experience while trying to comply with security team requirements. Vault was built to address the difficult task of passing sensitive data to users and applications without it being compromised. Within Vault, all transactions are token-based, which limits potential malicious activity, and provides greater visibility into whom and what is accessing that information.

Read More
AWS Security

Closed Loop Security and Compliance Helps You Safely Migrate to and Expand AWS Usage

DevOps staff in many organizations are one misconfiguration away from compromising their AWS resources to attackers as they migrate to and grow their adoption of existing and new AWS services. In this post, AWS Security Partner Cavirin proposes “Closed Loop Security” based on unifying proactive and reactive risk signals as a key strategy for DevOps staff to protect their AWS infrastructure from misconfigurations and vulnerabilities.

Read More
Security-8

How to Benchmark and Prioritize Security Threats in Amazon GuardDuty Using Sumo Logic

Users looking for enhanced security operations within their AWS environment can utilize Sumo Logic Global Intelligent Service (GIS) for Amazon GuardDuty. This solution allows organizations to separate the signal from the noise within your security alerts, helping to more accurately pinpoint investigations and resources. This comparison data allows companies to bolster their security efforts by proactively identifying and remediating threats.

Read More
APN Navigate Security Track-2

Why Your Company Should Become Security Experts on AWS

APN Partners with security expertise help customers identify asset vulnerabilities and develop an organizational understanding to manage security risks in AWS customer systems, assets, and data. If your company wants to help AWS customers with security, the new APN Navigate Security track provides APN Partners with a prescriptive journey to help you build expertise in cloud security solutions.

Read More

Driving Continuous Security and Configuration Checks for Amazon EKS with Alcide Advisor

The inherent complexities for running cloud-native applications such as Kubernetes, especially in a multi-cluster environment, are growing. Alcide Advisor creates a snapshot of your cluster’s security and compliance posture with actionable recommendations to ensure no security drifts are detected only in runtime. Alcide Advisor allows DevOps and security teams to discover misplaced secrets or secret access, identify Kubernetes vulnerabilities and perform Amazon EKS cluster checks.

Read More
Secrets Manager-1

Keeping the Security and Scalability of Serverless Apps Problem-Free with AWS Secrets Manager

AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources while enabling you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle. If you’re researching how to improve secrets management, it’s critical to curate the advice you find. The engineers at Stackery have spent lots of time doing just that and share several benefits for using AWS Secrets Manager to keep security and scalability problem-free down the line.

Read More

Extending On-Premises Cisco Cloud ACI Network Security Segmentation to AWS

Businesses need a network that can empower the data center to move workloads to the cloud. In most data centers, the diverse and disjointed visibility, as well as troubleshooting capabilities with no correlation across different environments, results in complex operational models. Cisco Cloud Application Centric Infrastructure (ACI) automates the management of end-to-end connectivity as well as the enforcement of consistent security policies for applications running in on-premises data centers and on AWS.

Read More

Enabling Digital Transformation with Secure Team Collaboration from Symphony

Symphony was built by a consortium of 15 leading global financial institutions to solve the critical issue of how to collaborate while remaining secure and compliant. This initial goal has lead Symphony to develop a platform that’s changing the way companies do business in critical industries like financial services. Its open APIs, integrations, bots, and workflows are helping to create a more democratic ecosystem for innovation, within and beyond financial services.

Read More
Cloud Management Tools-1

Control Access to Your Data with Slack Enterprise Key Management and AWS KMS

Slack has become a vital tool for collaboration for teams and companies around the world, and we are excited about the launch of Slack Enterprise Key Management (EKM). By integrating with AWS Key Management Service (KMS) in a customer’s AWS account, Slack EKM gives you tighter control over access to data that is stored in Slack. With Slack EKM, you can create a Customer Master Key that always stays under your control. Then, using key policies, you grant Slack access to use your CMK to generate and decrypt data keys.

Read More